xref: /dpdk/drivers/crypto/null/null_crypto_pmd.c (revision ecaed092b677d09b4b8645a3ddc38aac0ea929f7)
194b0ad8eSDeclan Doherty /*-
294b0ad8eSDeclan Doherty  *   BSD LICENSE
394b0ad8eSDeclan Doherty  *
494b0ad8eSDeclan Doherty  *   Copyright(c) 2016 Intel Corporation. All rights reserved.
594b0ad8eSDeclan Doherty  *
694b0ad8eSDeclan Doherty  *   Redistribution and use in source and binary forms, with or without
794b0ad8eSDeclan Doherty  *   modification, are permitted provided that the following conditions
894b0ad8eSDeclan Doherty  *   are met:
994b0ad8eSDeclan Doherty  *
1094b0ad8eSDeclan Doherty  *     * Redistributions of source code must retain the above copyright
1194b0ad8eSDeclan Doherty  *       notice, this list of conditions and the following disclaimer.
1294b0ad8eSDeclan Doherty  *     * Redistributions in binary form must reproduce the above copyright
1394b0ad8eSDeclan Doherty  *       notice, this list of conditions and the following disclaimer in
1494b0ad8eSDeclan Doherty  *       the documentation and/or other materials provided with the
1594b0ad8eSDeclan Doherty  *       distribution.
1694b0ad8eSDeclan Doherty  *     * Neither the name of Intel Corporation nor the names of its
1794b0ad8eSDeclan Doherty  *       contributors may be used to endorse or promote products derived
1894b0ad8eSDeclan Doherty  *       from this software without specific prior written permission.
1994b0ad8eSDeclan Doherty  *
2094b0ad8eSDeclan Doherty  *   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
2194b0ad8eSDeclan Doherty  *   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
2294b0ad8eSDeclan Doherty  *   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
2394b0ad8eSDeclan Doherty  *   A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
2494b0ad8eSDeclan Doherty  *   OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
2594b0ad8eSDeclan Doherty  *   SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
2694b0ad8eSDeclan Doherty  *   LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
2794b0ad8eSDeclan Doherty  *   DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
2894b0ad8eSDeclan Doherty  *   THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
2994b0ad8eSDeclan Doherty  *   (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
3094b0ad8eSDeclan Doherty  *   OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
3194b0ad8eSDeclan Doherty  */
3294b0ad8eSDeclan Doherty 
3394b0ad8eSDeclan Doherty #include <rte_common.h>
3494b0ad8eSDeclan Doherty #include <rte_config.h>
3594b0ad8eSDeclan Doherty #include <rte_cryptodev_pmd.h>
36fe363dd4SJan Viktorin #include <rte_vdev.h>
3794b0ad8eSDeclan Doherty #include <rte_malloc.h>
3894b0ad8eSDeclan Doherty 
3994b0ad8eSDeclan Doherty #include "null_crypto_pmd_private.h"
4094b0ad8eSDeclan Doherty 
4194b0ad8eSDeclan Doherty /** verify and set session parameters */
4294b0ad8eSDeclan Doherty int
4394b0ad8eSDeclan Doherty null_crypto_set_session_parameters(
4494b0ad8eSDeclan Doherty 		struct null_crypto_session *sess __rte_unused,
4594b0ad8eSDeclan Doherty 		const struct rte_crypto_sym_xform *xform)
4694b0ad8eSDeclan Doherty {
4794b0ad8eSDeclan Doherty 	if (xform == NULL) {
4894b0ad8eSDeclan Doherty 		return -1;
4994b0ad8eSDeclan Doherty 	} else if (xform->type == RTE_CRYPTO_SYM_XFORM_AUTH &&
5094b0ad8eSDeclan Doherty 			xform->next == NULL) {
5194b0ad8eSDeclan Doherty 		/* Authentication Only */
5294b0ad8eSDeclan Doherty 		if (xform->auth.algo == RTE_CRYPTO_AUTH_NULL)
5394b0ad8eSDeclan Doherty 			return 0;
5494b0ad8eSDeclan Doherty 	} else if (xform->type == RTE_CRYPTO_SYM_XFORM_AUTH &&
5594b0ad8eSDeclan Doherty 			xform->next->type == RTE_CRYPTO_SYM_XFORM_CIPHER) {
5694b0ad8eSDeclan Doherty 		/* Authentication then Cipher */
5794b0ad8eSDeclan Doherty 		if (xform->auth.algo == RTE_CRYPTO_AUTH_NULL &&
5894b0ad8eSDeclan Doherty 			xform->next->cipher.algo == RTE_CRYPTO_CIPHER_NULL)
5994b0ad8eSDeclan Doherty 			return 0;
6094b0ad8eSDeclan Doherty 	} else if (xform->type == RTE_CRYPTO_SYM_XFORM_CIPHER &&
6194b0ad8eSDeclan Doherty 			xform->next == NULL) {
6294b0ad8eSDeclan Doherty 		/* Cipher Only */
6394b0ad8eSDeclan Doherty 		if (xform->cipher.algo == RTE_CRYPTO_CIPHER_NULL)
6494b0ad8eSDeclan Doherty 			return 0;
6594b0ad8eSDeclan Doherty 	} else if (xform->type == RTE_CRYPTO_SYM_XFORM_CIPHER &&
6694b0ad8eSDeclan Doherty 			xform->next->type == RTE_CRYPTO_SYM_XFORM_AUTH) {
6794b0ad8eSDeclan Doherty 		/* Cipher then Authentication */
6894b0ad8eSDeclan Doherty 		if (xform->cipher.algo == RTE_CRYPTO_CIPHER_NULL &&
6994b0ad8eSDeclan Doherty 			xform->next->auth.algo == RTE_CRYPTO_AUTH_NULL)
7094b0ad8eSDeclan Doherty 			return 0;
7194b0ad8eSDeclan Doherty 	}
7294b0ad8eSDeclan Doherty 
7394b0ad8eSDeclan Doherty 	return -1;
7494b0ad8eSDeclan Doherty }
7594b0ad8eSDeclan Doherty 
7694b0ad8eSDeclan Doherty /** Process crypto operation for mbuf */
7794b0ad8eSDeclan Doherty static int
7894b0ad8eSDeclan Doherty process_op(const struct null_crypto_qp *qp, struct rte_crypto_op *op,
7994b0ad8eSDeclan Doherty 		struct null_crypto_session *sess __rte_unused)
8094b0ad8eSDeclan Doherty {
8194b0ad8eSDeclan Doherty 	/* set status as successful by default */
8294b0ad8eSDeclan Doherty 	op->status = RTE_CRYPTO_OP_STATUS_SUCCESS;
8394b0ad8eSDeclan Doherty 
8494b0ad8eSDeclan Doherty 	/*
8594b0ad8eSDeclan Doherty 	 * if crypto session and operation are valid just enqueue the packet
8694b0ad8eSDeclan Doherty 	 * in the processed ring
8794b0ad8eSDeclan Doherty 	 */
8894b0ad8eSDeclan Doherty 	return rte_ring_enqueue(qp->processed_pkts, (void *)op);
8994b0ad8eSDeclan Doherty }
9094b0ad8eSDeclan Doherty 
9194b0ad8eSDeclan Doherty static struct null_crypto_session *
9294b0ad8eSDeclan Doherty get_session(struct null_crypto_qp *qp, struct rte_crypto_sym_op *op)
9394b0ad8eSDeclan Doherty {
9494b0ad8eSDeclan Doherty 	struct null_crypto_session *sess;
9594b0ad8eSDeclan Doherty 
96f0e7e253SFiona Trahe 	if (op->sess_type == RTE_CRYPTO_SYM_OP_WITH_SESSION) {
9794b0ad8eSDeclan Doherty 		if (unlikely(op->session == NULL ||
98f0e7e253SFiona Trahe 			     op->session->dev_type != RTE_CRYPTODEV_NULL_PMD))
9994b0ad8eSDeclan Doherty 			return NULL;
10094b0ad8eSDeclan Doherty 
10194b0ad8eSDeclan Doherty 		sess = (struct null_crypto_session *)op->session->_private;
10294b0ad8eSDeclan Doherty 	} else  {
10394b0ad8eSDeclan Doherty 		struct rte_cryptodev_session *c_sess = NULL;
10494b0ad8eSDeclan Doherty 
10594b0ad8eSDeclan Doherty 		if (rte_mempool_get(qp->sess_mp, (void **)&c_sess))
10694b0ad8eSDeclan Doherty 			return NULL;
10794b0ad8eSDeclan Doherty 
10894b0ad8eSDeclan Doherty 		sess = (struct null_crypto_session *)c_sess->_private;
10994b0ad8eSDeclan Doherty 
11094b0ad8eSDeclan Doherty 		if (null_crypto_set_session_parameters(sess, op->xform)	!= 0)
11194b0ad8eSDeclan Doherty 			return NULL;
11294b0ad8eSDeclan Doherty 	}
11394b0ad8eSDeclan Doherty 
11494b0ad8eSDeclan Doherty 	return sess;
11594b0ad8eSDeclan Doherty }
11694b0ad8eSDeclan Doherty 
11794b0ad8eSDeclan Doherty /** Enqueue burst */
11894b0ad8eSDeclan Doherty static uint16_t
11994b0ad8eSDeclan Doherty null_crypto_pmd_enqueue_burst(void *queue_pair, struct rte_crypto_op **ops,
12094b0ad8eSDeclan Doherty 		uint16_t nb_ops)
12194b0ad8eSDeclan Doherty {
12294b0ad8eSDeclan Doherty 	struct null_crypto_session *sess;
12394b0ad8eSDeclan Doherty 	struct null_crypto_qp *qp = queue_pair;
12494b0ad8eSDeclan Doherty 
12594b0ad8eSDeclan Doherty 	int i, retval;
12694b0ad8eSDeclan Doherty 
12794b0ad8eSDeclan Doherty 	for (i = 0; i < nb_ops; i++) {
12894b0ad8eSDeclan Doherty 		sess = get_session(qp, ops[i]->sym);
12994b0ad8eSDeclan Doherty 		if (unlikely(sess == NULL))
13094b0ad8eSDeclan Doherty 			goto enqueue_err;
13194b0ad8eSDeclan Doherty 
13294b0ad8eSDeclan Doherty 		retval = process_op(qp, ops[i], sess);
13394b0ad8eSDeclan Doherty 		if (unlikely(retval < 0))
13494b0ad8eSDeclan Doherty 			goto enqueue_err;
13594b0ad8eSDeclan Doherty 	}
13694b0ad8eSDeclan Doherty 
13794b0ad8eSDeclan Doherty 	qp->qp_stats.enqueued_count += i;
13894b0ad8eSDeclan Doherty 	return i;
13994b0ad8eSDeclan Doherty 
14094b0ad8eSDeclan Doherty enqueue_err:
14194b0ad8eSDeclan Doherty 	if (ops[i])
14294b0ad8eSDeclan Doherty 		ops[i]->status = RTE_CRYPTO_OP_STATUS_INVALID_ARGS;
14394b0ad8eSDeclan Doherty 
14494b0ad8eSDeclan Doherty 	qp->qp_stats.enqueue_err_count++;
14594b0ad8eSDeclan Doherty 	return i;
14694b0ad8eSDeclan Doherty }
14794b0ad8eSDeclan Doherty 
14894b0ad8eSDeclan Doherty /** Dequeue burst */
14994b0ad8eSDeclan Doherty static uint16_t
15094b0ad8eSDeclan Doherty null_crypto_pmd_dequeue_burst(void *queue_pair, struct rte_crypto_op **ops,
15194b0ad8eSDeclan Doherty 		uint16_t nb_ops)
15294b0ad8eSDeclan Doherty {
15394b0ad8eSDeclan Doherty 	struct null_crypto_qp *qp = queue_pair;
15494b0ad8eSDeclan Doherty 
15594b0ad8eSDeclan Doherty 	unsigned nb_dequeued;
15694b0ad8eSDeclan Doherty 
15794b0ad8eSDeclan Doherty 	nb_dequeued = rte_ring_dequeue_burst(qp->processed_pkts,
158*ecaed092SBruce Richardson 			(void **)ops, nb_ops, NULL);
15994b0ad8eSDeclan Doherty 	qp->qp_stats.dequeued_count += nb_dequeued;
16094b0ad8eSDeclan Doherty 
16194b0ad8eSDeclan Doherty 	return nb_dequeued;
16294b0ad8eSDeclan Doherty }
16394b0ad8eSDeclan Doherty 
16450a3345fSShreyansh Jain static int cryptodev_null_remove(const char *name);
16594b0ad8eSDeclan Doherty 
16694b0ad8eSDeclan Doherty /** Create crypto device */
16794b0ad8eSDeclan Doherty static int
168d803b443SFan Zhang cryptodev_null_create(struct rte_crypto_vdev_init_params *init_params)
16994b0ad8eSDeclan Doherty {
17094b0ad8eSDeclan Doherty 	struct rte_cryptodev *dev;
17194b0ad8eSDeclan Doherty 	struct null_crypto_private *internals;
17294b0ad8eSDeclan Doherty 
173d803b443SFan Zhang 	if (init_params->name[0] == '\0') {
174d803b443SFan Zhang 		int ret = rte_cryptodev_pmd_create_dev_name(
175d803b443SFan Zhang 				init_params->name,
176d803b443SFan Zhang 				RTE_STR(CRYPTODEV_NAME_NULL_PMD));
177d803b443SFan Zhang 
178d803b443SFan Zhang 		if (ret < 0) {
179d803b443SFan Zhang 			NULL_CRYPTO_LOG_ERR("failed to create unique "
180d803b443SFan Zhang 					"name");
181d803b443SFan Zhang 			return ret;
182d803b443SFan Zhang 		}
18394b0ad8eSDeclan Doherty 	}
18494b0ad8eSDeclan Doherty 
185d803b443SFan Zhang 	dev = rte_cryptodev_pmd_virtual_dev_init(init_params->name,
18694b0ad8eSDeclan Doherty 			sizeof(struct null_crypto_private),
18794b0ad8eSDeclan Doherty 			init_params->socket_id);
18894b0ad8eSDeclan Doherty 	if (dev == NULL) {
18994b0ad8eSDeclan Doherty 		NULL_CRYPTO_LOG_ERR("failed to create cryptodev vdev");
19094b0ad8eSDeclan Doherty 		goto init_error;
19194b0ad8eSDeclan Doherty 	}
19294b0ad8eSDeclan Doherty 
19394b0ad8eSDeclan Doherty 	dev->dev_type = RTE_CRYPTODEV_NULL_PMD;
19494b0ad8eSDeclan Doherty 	dev->dev_ops = null_crypto_pmd_ops;
19594b0ad8eSDeclan Doherty 
19694b0ad8eSDeclan Doherty 	/* register rx/tx burst functions for data path */
19794b0ad8eSDeclan Doherty 	dev->dequeue_burst = null_crypto_pmd_dequeue_burst;
19894b0ad8eSDeclan Doherty 	dev->enqueue_burst = null_crypto_pmd_enqueue_burst;
19994b0ad8eSDeclan Doherty 
20026c2e4adSDeclan Doherty 	dev->feature_flags = RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO |
2012d03ec6aSTomasz Kulasek 			RTE_CRYPTODEV_FF_SYM_OPERATION_CHAINING |
2022d03ec6aSTomasz Kulasek 			RTE_CRYPTODEV_FF_MBUF_SCATTER_GATHER;
20326c2e4adSDeclan Doherty 
20494b0ad8eSDeclan Doherty 	internals = dev->data->dev_private;
20594b0ad8eSDeclan Doherty 
20694b0ad8eSDeclan Doherty 	internals->max_nb_qpairs = init_params->max_nb_queue_pairs;
20794b0ad8eSDeclan Doherty 	internals->max_nb_sessions = init_params->max_nb_sessions;
20894b0ad8eSDeclan Doherty 
20994b0ad8eSDeclan Doherty 	return 0;
21094b0ad8eSDeclan Doherty 
21194b0ad8eSDeclan Doherty init_error:
212d803b443SFan Zhang 	NULL_CRYPTO_LOG_ERR("driver %s: cryptodev_null_create failed",
213d803b443SFan Zhang 			init_params->name);
214d803b443SFan Zhang 	cryptodev_null_remove(init_params->name);
21594b0ad8eSDeclan Doherty 
21694b0ad8eSDeclan Doherty 	return -EFAULT;
21794b0ad8eSDeclan Doherty }
21894b0ad8eSDeclan Doherty 
21994b0ad8eSDeclan Doherty /** Initialise null crypto device */
22094b0ad8eSDeclan Doherty static int
22150a3345fSShreyansh Jain cryptodev_null_probe(const char *name,
22294b0ad8eSDeclan Doherty 		const char *input_args)
22394b0ad8eSDeclan Doherty {
22494b0ad8eSDeclan Doherty 	struct rte_crypto_vdev_init_params init_params = {
22594b0ad8eSDeclan Doherty 		RTE_CRYPTODEV_VDEV_DEFAULT_MAX_NB_QUEUE_PAIRS,
22694b0ad8eSDeclan Doherty 		RTE_CRYPTODEV_VDEV_DEFAULT_MAX_NB_SESSIONS,
227d803b443SFan Zhang 		rte_socket_id(),
228d803b443SFan Zhang 		{0}
22994b0ad8eSDeclan Doherty 	};
23094b0ad8eSDeclan Doherty 
23194b0ad8eSDeclan Doherty 	rte_cryptodev_parse_vdev_init_params(&init_params, input_args);
23294b0ad8eSDeclan Doherty 
23394b0ad8eSDeclan Doherty 	RTE_LOG(INFO, PMD, "Initialising %s on NUMA node %d\n", name,
23494b0ad8eSDeclan Doherty 			init_params.socket_id);
235d803b443SFan Zhang 	if (init_params.name[0] != '\0')
236d803b443SFan Zhang 		RTE_LOG(INFO, PMD, "  User defined name = %s\n",
237d803b443SFan Zhang 			init_params.name);
23894b0ad8eSDeclan Doherty 	RTE_LOG(INFO, PMD, "  Max number of queue pairs = %d\n",
23994b0ad8eSDeclan Doherty 			init_params.max_nb_queue_pairs);
24094b0ad8eSDeclan Doherty 	RTE_LOG(INFO, PMD, "  Max number of sessions = %d\n",
24194b0ad8eSDeclan Doherty 			init_params.max_nb_sessions);
24294b0ad8eSDeclan Doherty 
243d803b443SFan Zhang 	return cryptodev_null_create(&init_params);
24494b0ad8eSDeclan Doherty }
24594b0ad8eSDeclan Doherty 
24694b0ad8eSDeclan Doherty /** Uninitialise null crypto device */
24794b0ad8eSDeclan Doherty static int
24850a3345fSShreyansh Jain cryptodev_null_remove(const char *name)
24994b0ad8eSDeclan Doherty {
25094b0ad8eSDeclan Doherty 	if (name == NULL)
25194b0ad8eSDeclan Doherty 		return -EINVAL;
25294b0ad8eSDeclan Doherty 
25394b0ad8eSDeclan Doherty 	RTE_LOG(INFO, PMD, "Closing null crypto device %s on numa socket %u\n",
25494b0ad8eSDeclan Doherty 			name, rte_socket_id());
25594b0ad8eSDeclan Doherty 
25694b0ad8eSDeclan Doherty 	return 0;
25794b0ad8eSDeclan Doherty }
25894b0ad8eSDeclan Doherty 
259fe363dd4SJan Viktorin static struct rte_vdev_driver cryptodev_null_pmd_drv = {
26050a3345fSShreyansh Jain 	.probe = cryptodev_null_probe,
26150a3345fSShreyansh Jain 	.remove = cryptodev_null_remove
26294b0ad8eSDeclan Doherty };
26394b0ad8eSDeclan Doherty 
26401f19227SShreyansh Jain RTE_PMD_REGISTER_VDEV(CRYPTODEV_NAME_NULL_PMD, cryptodev_null_pmd_drv);
265479c4af3SJan Blunck RTE_PMD_REGISTER_ALIAS(CRYPTODEV_NAME_NULL_PMD, cryptodev_null_pmd);
26601f19227SShreyansh Jain RTE_PMD_REGISTER_PARAM_STRING(CRYPTODEV_NAME_NULL_PMD,
26765eca099SPablo de Lara 	"max_nb_queue_pairs=<int> "
26865eca099SPablo de Lara 	"max_nb_sessions=<int> "
26965eca099SPablo de Lara 	"socket_id=<int>");
270